|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-21 14:30 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
A poisoning-resilient LDP schema using oblivious transfer and Hadamard transform Masahiro Shimizu, Hiroaki Kikuchi (Meiji Univ.) ICSS2023-80 |
In recent years, Local Differential Privacy (LDP) has been actively used to collect and utilize users’ usage history from... [more] |
ICSS2023-80 pp.79-86 |
SITE, IA, IPSJ-IOT [detail] |
2021-03-02 13:55 |
Online |
Online |
Mutual Secrecy of Attributes and Authorization Policies in Identity Federation Satsuki Nishioka, Yasuo Okabe (Kyoto Univ.) SITE2020-53 IA2020-49 |
In modern Web services, authentication federation that separates the Identity Provider (IdP), which centrally manages au... [more] |
SITE2020-53 IA2020-49 pp.93-100 |
ICSS |
2020-11-26 16:00 |
Online |
Online |
Non-interactive oblivious transfer protocol based on TEE Masahide Kobayashi, Takashi Nishide (Univ. of Tsukuba) ICSS2020-24 |
Oblivious transfer is a protocol consisting of two parties, a data sender and receiver, and is used for secure computati... [more] |
ICSS2020-24 pp.26-31 |
COMP |
2009-05-26 10:40 |
Saitama |
Saitama Univ. |
Strengthening the Security of Distributed Oblivious Transfer Kai Yuen Cheong, Takeshi Koshiba, Shohei Nishiyama (Saitama Univ.) COMP2009-11 |
We study the distributed oblivious transfer first proposed by Naor and Pinkas in ASIACRYPT 2000, and generalized by Blun... [more] |
COMP2009-11 pp.13-19 |
ISEC |
2007-05-18 14:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
consideration of quantum Oblivious Transfer Atsushi Waseda (NICT), Takayuki Takagi, Masakazu Soshi, Atsuko Miyaji (JAIST) ISEC2007-10 |
Quantum oblivious transfer (QOT) is one of the important primitive for quantum security. In representative example of Q... [more] |
ISEC2007-10 pp.65-68 |
ISEC |
2005-12-16 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Anonymous Password-Based Authenticated Key Exchange Duong Viet Quang, Akihiro Yamamura, Hidema Tanaka (NICT) |
We propose and discuss an {\it anonymous password-based authenticated key exchange scheme} that allows a user in a group... [more] |
ISEC2005-116 pp.35-42 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 16:10 |
Iwate |
Iwate Prefectural University |
Reducing Communication Complexity of the Private Data Retrieval Protocol with Consistent Results Satoshi Nakayama, Maki Yoshida, Shingo Okamura, Akira Fujiwara, Toru Fujiwara (Osaka Univ.) |
A data retrieval protocol between a database server, who has a database,
and a user, who has an index, allows the user... [more] |
ISEC2005-61 pp.129-136 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|